Lookup for vulnerable packages by Package URL.

Purlpkg:generic/postgresql@9.4.0
Typegeneric
Namespace
Namepostgresql
Version9.4.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version9.4.1
Latest_non_vulnerable_version18.2.0
Affected_by_vulnerabilities
0
url VCID-1qap-rdxz-4uer
vulnerability_id VCID-1qap-rdxz-4uer
summary pgcrypto has multiple error messages for decryption with an incorrect key.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3167.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3167.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3167
reference_id
reference_type
scores
0
value 0.01812
scoring_system epss
scoring_elements 0.82878
published_at 2026-04-21T12:55:00Z
1
value 0.01812
scoring_system epss
scoring_elements 0.82774
published_at 2026-04-01T12:55:00Z
2
value 0.01812
scoring_system epss
scoring_elements 0.82838
published_at 2026-04-13T12:55:00Z
3
value 0.01812
scoring_system epss
scoring_elements 0.82877
published_at 2026-04-16T12:55:00Z
4
value 0.01812
scoring_system epss
scoring_elements 0.82876
published_at 2026-04-18T12:55:00Z
5
value 0.01812
scoring_system epss
scoring_elements 0.8279
published_at 2026-04-02T12:55:00Z
6
value 0.01812
scoring_system epss
scoring_elements 0.82804
published_at 2026-04-04T12:55:00Z
7
value 0.01812
scoring_system epss
scoring_elements 0.82799
published_at 2026-04-07T12:55:00Z
8
value 0.01812
scoring_system epss
scoring_elements 0.82825
published_at 2026-04-08T12:55:00Z
9
value 0.01812
scoring_system epss
scoring_elements 0.82831
published_at 2026-04-09T12:55:00Z
10
value 0.01812
scoring_system epss
scoring_elements 0.82847
published_at 2026-04-11T12:55:00Z
11
value 0.01812
scoring_system epss
scoring_elements 0.82842
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3167
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
5
reference_url https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/
6
reference_url https://www.postgresql.org/support/security/CVE-2015-3167/
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2015-3167/
7
reference_url http://ubuntu.com/usn/usn-2621-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-2621-1
8
reference_url http://www.debian.org/security/2015/dsa-3269
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3269
9
reference_url http://www.debian.org/security/2015/dsa-3270
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3270
10
reference_url http://www.postgresql.org/about/news/1587/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1587/
11
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
12
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
13
reference_url http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
14
reference_url http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
15
reference_url http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1221541
reference_id 1221541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1221541
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3167
reference_id CVE-2015-3167
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-3167
26
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
27
reference_url https://access.redhat.com/errata/RHSA-2015:1194
reference_id RHSA-2015:1194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1194
28
reference_url https://access.redhat.com/errata/RHSA-2015:1195
reference_id RHSA-2015:1195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1195
29
reference_url https://access.redhat.com/errata/RHSA-2015:1196
reference_id RHSA-2015:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1196
30
reference_url https://usn.ubuntu.com/2621-1/
reference_id USN-2621-1
reference_type
scores
url https://usn.ubuntu.com/2621-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.2
purl pkg:generic/postgresql@9.4.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.2
aliases CVE-2015-3167
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1qap-rdxz-4uer
1
url VCID-3qrq-rc38-13ep
vulnerability_id VCID-3qrq-rc38-13ep
summary empty password accepted in some authentication methodsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7546.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7546.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7546
reference_id
reference_type
scores
0
value 0.33122
scoring_system epss
scoring_elements 0.96868
published_at 2026-04-01T12:55:00Z
1
value 0.33122
scoring_system epss
scoring_elements 0.96913
published_at 2026-04-21T12:55:00Z
2
value 0.33122
scoring_system epss
scoring_elements 0.96898
published_at 2026-04-12T12:55:00Z
3
value 0.33122
scoring_system epss
scoring_elements 0.96899
published_at 2026-04-13T12:55:00Z
4
value 0.33122
scoring_system epss
scoring_elements 0.96907
published_at 2026-04-16T12:55:00Z
5
value 0.33122
scoring_system epss
scoring_elements 0.96911
published_at 2026-04-18T12:55:00Z
6
value 0.33122
scoring_system epss
scoring_elements 0.96875
published_at 2026-04-02T12:55:00Z
7
value 0.33122
scoring_system epss
scoring_elements 0.9688
published_at 2026-04-04T12:55:00Z
8
value 0.33122
scoring_system epss
scoring_elements 0.96884
published_at 2026-04-07T12:55:00Z
9
value 0.33122
scoring_system epss
scoring_elements 0.96893
published_at 2026-04-08T12:55:00Z
10
value 0.33122
scoring_system epss
scoring_elements 0.96894
published_at 2026-04-09T12:55:00Z
11
value 0.33122
scoring_system epss
scoring_elements 0.96897
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7546
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/
7
reference_url https://www.postgresql.org/support/security/CVE-2017-7546/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2017-7546/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477184
reference_id 1477184
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477184
9
reference_url https://security.archlinux.org/ASA-201709-2
reference_id ASA-201709-2
reference_type
scores
url https://security.archlinux.org/ASA-201709-2
10
reference_url https://security.archlinux.org/AVG-381
reference_id AVG-381
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-381
11
reference_url https://security.gentoo.org/glsa/201710-06
reference_id GLSA-201710-06
reference_type
scores
url https://security.gentoo.org/glsa/201710-06
12
reference_url https://access.redhat.com/errata/RHSA-2017:2677
reference_id RHSA-2017:2677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2677
13
reference_url https://access.redhat.com/errata/RHSA-2017:2678
reference_id RHSA-2017:2678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2678
14
reference_url https://access.redhat.com/errata/RHSA-2017:2728
reference_id RHSA-2017:2728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2728
15
reference_url https://access.redhat.com/errata/RHSA-2017:2860
reference_id RHSA-2017:2860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2860
16
reference_url https://usn.ubuntu.com/3390-1/
reference_id USN-3390-1
reference_type
scores
url https://usn.ubuntu.com/3390-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.13
purl pkg:generic/postgresql@9.4.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.13
1
url pkg:generic/postgresql@9.5.8
purl pkg:generic/postgresql@9.5.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.8
2
url pkg:generic/postgresql@9.6.4
purl pkg:generic/postgresql@9.6.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.4
aliases CVE-2017-7546
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qrq-rc38-13ep
2
url VCID-45vk-2xsq-cffk
vulnerability_id VCID-45vk-2xsq-cffk
summary libpq ignores PGREQUIRESSL environment variablemore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7485.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7485
reference_id
reference_type
scores
0
value 0.0071
scoring_system epss
scoring_elements 0.72177
published_at 2026-04-01T12:55:00Z
1
value 0.0071
scoring_system epss
scoring_elements 0.7226
published_at 2026-04-21T12:55:00Z
2
value 0.0071
scoring_system epss
scoring_elements 0.7222
published_at 2026-04-13T12:55:00Z
3
value 0.0071
scoring_system epss
scoring_elements 0.72263
published_at 2026-04-16T12:55:00Z
4
value 0.0071
scoring_system epss
scoring_elements 0.72273
published_at 2026-04-18T12:55:00Z
5
value 0.0071
scoring_system epss
scoring_elements 0.72182
published_at 2026-04-02T12:55:00Z
6
value 0.0071
scoring_system epss
scoring_elements 0.72203
published_at 2026-04-04T12:55:00Z
7
value 0.0071
scoring_system epss
scoring_elements 0.72178
published_at 2026-04-07T12:55:00Z
8
value 0.0071
scoring_system epss
scoring_elements 0.72215
published_at 2026-04-08T12:55:00Z
9
value 0.0071
scoring_system epss
scoring_elements 0.72227
published_at 2026-04-09T12:55:00Z
10
value 0.0071
scoring_system epss
scoring_elements 0.7225
published_at 2026-04-11T12:55:00Z
11
value 0.0071
scoring_system epss
scoring_elements 0.72234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/
7
reference_url https://www.postgresql.org/support/security/CVE-2017-7485/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2017-7485/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1448086
reference_id 1448086
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1448086
9
reference_url https://security.archlinux.org/ASA-201705-24
reference_id ASA-201705-24
reference_type
scores
url https://security.archlinux.org/ASA-201705-24
10
reference_url https://security.archlinux.org/AVG-280
reference_id AVG-280
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-280
11
reference_url https://security.gentoo.org/glsa/201710-06
reference_id GLSA-201710-06
reference_type
scores
url https://security.gentoo.org/glsa/201710-06
12
reference_url https://access.redhat.com/errata/RHSA-2017:1677
reference_id RHSA-2017:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1677
13
reference_url https://access.redhat.com/errata/RHSA-2017:1678
reference_id RHSA-2017:1678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1678
14
reference_url https://access.redhat.com/errata/RHSA-2017:1838
reference_id RHSA-2017:1838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1838
15
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
fixed_packages
0
url pkg:generic/postgresql@9.4.12
purl pkg:generic/postgresql@9.4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.12
1
url pkg:generic/postgresql@9.5.7
purl pkg:generic/postgresql@9.5.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.7
2
url pkg:generic/postgresql@9.6.3
purl pkg:generic/postgresql@9.6.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.3
aliases CVE-2017-7485
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-45vk-2xsq-cffk
3
url VCID-625c-amyd-dybm
vulnerability_id VCID-625c-amyd-dybm
summary Unanticipated errors from the standard library.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3166.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3166.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3166
reference_id
reference_type
scores
0
value 0.02185
scoring_system epss
scoring_elements 0.84362
published_at 2026-04-09T12:55:00Z
1
value 0.02185
scoring_system epss
scoring_elements 0.84299
published_at 2026-04-01T12:55:00Z
2
value 0.02185
scoring_system epss
scoring_elements 0.84335
published_at 2026-04-07T12:55:00Z
3
value 0.02185
scoring_system epss
scoring_elements 0.84356
published_at 2026-04-08T12:55:00Z
4
value 0.02185
scoring_system epss
scoring_elements 0.84312
published_at 2026-04-02T12:55:00Z
5
value 0.02185
scoring_system epss
scoring_elements 0.84332
published_at 2026-04-04T12:55:00Z
6
value 0.02825
scoring_system epss
scoring_elements 0.86172
published_at 2026-04-11T12:55:00Z
7
value 0.05386
scoring_system epss
scoring_elements 0.9013
published_at 2026-04-21T12:55:00Z
8
value 0.05386
scoring_system epss
scoring_elements 0.90116
published_at 2026-04-13T12:55:00Z
9
value 0.05386
scoring_system epss
scoring_elements 0.90133
published_at 2026-04-16T12:55:00Z
10
value 0.05386
scoring_system epss
scoring_elements 0.90134
published_at 2026-04-18T12:55:00Z
11
value 0.05386
scoring_system epss
scoring_elements 0.90122
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3166
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
5
reference_url https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/
6
reference_url https://www.postgresql.org/support/security/CVE-2015-3166/
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L']
url https://www.postgresql.org/support/security/CVE-2015-3166/
7
reference_url http://ubuntu.com/usn/usn-2621-1
reference_id
reference_type
scores
url http://ubuntu.com/usn/usn-2621-1
8
reference_url http://www.debian.org/security/2015/dsa-3269
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3269
9
reference_url http://www.debian.org/security/2015/dsa-3270
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3270
10
reference_url http://www.postgresql.org/about/news/1587/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1587/
11
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-20.html
12
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-16.html
13
reference_url http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.2/static/release-9-2-11.html
14
reference_url http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.3/static/release-9-3-7.html
15
reference_url http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.4/static/release-9-4-2.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1221539
reference_id 1221539
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1221539
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3166
reference_id CVE-2015-3166
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-3166
26
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
27
reference_url https://access.redhat.com/errata/RHSA-2015:1194
reference_id RHSA-2015:1194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1194
28
reference_url https://access.redhat.com/errata/RHSA-2015:1195
reference_id RHSA-2015:1195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1195
29
reference_url https://access.redhat.com/errata/RHSA-2015:1196
reference_id RHSA-2015:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1196
30
reference_url https://usn.ubuntu.com/2621-1/
reference_id USN-2621-1
reference_type
scores
url https://usn.ubuntu.com/2621-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.2
purl pkg:generic/postgresql@9.4.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.2
aliases CVE-2015-3166
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-625c-amyd-dybm
4
url VCID-723y-bsbd-6kfd
vulnerability_id VCID-723y-bsbd-6kfd
summary selectivity estimators bypass SELECT privilege checksmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7484.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7484
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78171
published_at 2026-04-21T12:55:00Z
1
value 0.0129
scoring_system epss
scoring_elements 0.79623
published_at 2026-04-07T12:55:00Z
2
value 0.0129
scoring_system epss
scoring_elements 0.79608
published_at 2026-04-01T12:55:00Z
3
value 0.0129
scoring_system epss
scoring_elements 0.79664
published_at 2026-04-12T12:55:00Z
4
value 0.0129
scoring_system epss
scoring_elements 0.79656
published_at 2026-04-13T12:55:00Z
5
value 0.0129
scoring_system epss
scoring_elements 0.79685
published_at 2026-04-18T12:55:00Z
6
value 0.0129
scoring_system epss
scoring_elements 0.79614
published_at 2026-04-02T12:55:00Z
7
value 0.0129
scoring_system epss
scoring_elements 0.79637
published_at 2026-04-04T12:55:00Z
8
value 0.0129
scoring_system epss
scoring_elements 0.79651
published_at 2026-04-08T12:55:00Z
9
value 0.0129
scoring_system epss
scoring_elements 0.79659
published_at 2026-04-09T12:55:00Z
10
value 0.0129
scoring_system epss
scoring_elements 0.7968
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/
7
reference_url https://www.postgresql.org/support/security/CVE-2017-7484/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2017-7484/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1448078
reference_id 1448078
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1448078
9
reference_url https://security.archlinux.org/ASA-201705-23
reference_id ASA-201705-23
reference_type
scores
url https://security.archlinux.org/ASA-201705-23
10
reference_url https://security.archlinux.org/AVG-272
reference_id AVG-272
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-272
11
reference_url https://security.gentoo.org/glsa/201710-06
reference_id GLSA-201710-06
reference_type
scores
url https://security.gentoo.org/glsa/201710-06
12
reference_url https://access.redhat.com/errata/RHSA-2017:1677
reference_id RHSA-2017:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1677
13
reference_url https://access.redhat.com/errata/RHSA-2017:1678
reference_id RHSA-2017:1678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1678
14
reference_url https://access.redhat.com/errata/RHSA-2017:1838
reference_id RHSA-2017:1838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1838
15
reference_url https://access.redhat.com/errata/RHSA-2017:1983
reference_id RHSA-2017:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1983
16
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
fixed_packages
0
url pkg:generic/postgresql@9.4.12
purl pkg:generic/postgresql@9.4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.12
1
url pkg:generic/postgresql@9.5.7
purl pkg:generic/postgresql@9.5.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.7
2
url pkg:generic/postgresql@9.6.3
purl pkg:generic/postgresql@9.6.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.3
aliases CVE-2017-7484
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-723y-bsbd-6kfd
5
url VCID-7xfn-1fv3-1bgv
vulnerability_id VCID-7xfn-1fv3-1bgv
summary Uncontrolled search path element in pg_dump and other client applicationsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1058.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1058
reference_id
reference_type
scores
0
value 0.82687
scoring_system epss
scoring_elements 0.99229
published_at 2026-04-01T12:55:00Z
1
value 0.82687
scoring_system epss
scoring_elements 0.99241
published_at 2026-04-21T12:55:00Z
2
value 0.82687
scoring_system epss
scoring_elements 0.99238
published_at 2026-04-07T12:55:00Z
3
value 0.82687
scoring_system epss
scoring_elements 0.99239
published_at 2026-04-13T12:55:00Z
4
value 0.82687
scoring_system epss
scoring_elements 0.9924
published_at 2026-04-16T12:55:00Z
5
value 0.82687
scoring_system epss
scoring_elements 0.99231
published_at 2026-04-02T12:55:00Z
6
value 0.82687
scoring_system epss
scoring_elements 0.99234
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1058
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-103-968-9512-9417-and-9322-released-1834/
4
reference_url https://www.postgresql.org/support/security/CVE-2018-1058/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-1058/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1547044
reference_id 1547044
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1547044
6
reference_url https://security.archlinux.org/ASA-201803-9
reference_id ASA-201803-9
reference_type
scores
url https://security.archlinux.org/ASA-201803-9
7
reference_url https://security.archlinux.org/AVG-643
reference_id AVG-643
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-643
8
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
9
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
10
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
11
reference_url https://usn.ubuntu.com/3589-1/
reference_id USN-3589-1
reference_type
scores
url https://usn.ubuntu.com/3589-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.17
purl pkg:generic/postgresql@9.4.17
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.17
1
url pkg:generic/postgresql@9.5.12
purl pkg:generic/postgresql@9.5.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.12
2
url pkg:generic/postgresql@9.6.8
purl pkg:generic/postgresql@9.6.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.8
3
url pkg:generic/postgresql@10.3.0
purl pkg:generic/postgresql@10.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.3.0
aliases CVE-2018-1058
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7xfn-1fv3-1bgv
6
url VCID-8bu8-zpfv-8bgg
vulnerability_id VCID-8bu8-zpfv-8bgg
summary Exceptional database and role names could enable escalation to superusermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5424
reference_id
reference_type
scores
0
value 0.01674
scoring_system epss
scoring_elements 0.82076
published_at 2026-04-01T12:55:00Z
1
value 0.01674
scoring_system epss
scoring_elements 0.82184
published_at 2026-04-21T12:55:00Z
2
value 0.01674
scoring_system epss
scoring_elements 0.82181
published_at 2026-04-16T12:55:00Z
3
value 0.01674
scoring_system epss
scoring_elements 0.82182
published_at 2026-04-18T12:55:00Z
4
value 0.01674
scoring_system epss
scoring_elements 0.82088
published_at 2026-04-02T12:55:00Z
5
value 0.01674
scoring_system epss
scoring_elements 0.82109
published_at 2026-04-04T12:55:00Z
6
value 0.01674
scoring_system epss
scoring_elements 0.82105
published_at 2026-04-07T12:55:00Z
7
value 0.01674
scoring_system epss
scoring_elements 0.82132
published_at 2026-04-08T12:55:00Z
8
value 0.01674
scoring_system epss
scoring_elements 0.82139
published_at 2026-04-09T12:55:00Z
9
value 0.01674
scoring_system epss
scoring_elements 0.82158
published_at 2026-04-11T12:55:00Z
10
value 0.01674
scoring_system epss
scoring_elements 0.82149
published_at 2026-04-12T12:55:00Z
11
value 0.01674
scoring_system epss
scoring_elements 0.82144
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:S/C:C/I:C/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
6
reference_url https://www.postgresql.org/support/security/CVE-2016-5424/
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2016-5424/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1364002
reference_id 1364002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1364002
8
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
9
reference_url https://access.redhat.com/errata/RHSA-2016:1781
reference_id RHSA-2016:1781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1781
10
reference_url https://access.redhat.com/errata/RHSA-2016:1820
reference_id RHSA-2016:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1820
11
reference_url https://access.redhat.com/errata/RHSA-2016:1821
reference_id RHSA-2016:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1821
12
reference_url https://access.redhat.com/errata/RHSA-2016:2606
reference_id RHSA-2016:2606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2606
13
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
14
reference_url https://usn.ubuntu.com/3066-1/
reference_id USN-3066-1
reference_type
scores
url https://usn.ubuntu.com/3066-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.9
purl pkg:generic/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.9
1
url pkg:generic/postgresql@9.5.4
purl pkg:generic/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.4
aliases CVE-2016-5424
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8bu8-zpfv-8bgg
7
url VCID-9b6v-1bt1-dfgy
vulnerability_id VCID-9b6v-1bt1-dfgy
summary Certain nested CASE/WHEN expressions can crash servermore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5423.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5423
reference_id
reference_type
scores
0
value 0.034
scoring_system epss
scoring_elements 0.87365
published_at 2026-04-01T12:55:00Z
1
value 0.034
scoring_system epss
scoring_elements 0.87431
published_at 2026-04-21T12:55:00Z
2
value 0.034
scoring_system epss
scoring_elements 0.87433
published_at 2026-04-16T12:55:00Z
3
value 0.034
scoring_system epss
scoring_elements 0.87436
published_at 2026-04-18T12:55:00Z
4
value 0.034
scoring_system epss
scoring_elements 0.87374
published_at 2026-04-02T12:55:00Z
5
value 0.034
scoring_system epss
scoring_elements 0.8739
published_at 2026-04-04T12:55:00Z
6
value 0.034
scoring_system epss
scoring_elements 0.87389
published_at 2026-04-07T12:55:00Z
7
value 0.034
scoring_system epss
scoring_elements 0.87408
published_at 2026-04-08T12:55:00Z
8
value 0.034
scoring_system epss
scoring_elements 0.87415
published_at 2026-04-09T12:55:00Z
9
value 0.034
scoring_system epss
scoring_elements 0.87428
published_at 2026-04-11T12:55:00Z
10
value 0.034
scoring_system epss
scoring_elements 0.87423
published_at 2026-04-12T12:55:00Z
11
value 0.034
scoring_system epss
scoring_elements 0.87419
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5423
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2016-08-11-security-update-release-1688/
6
reference_url https://www.postgresql.org/support/security/CVE-2016-5423/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2016-5423/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1364001
reference_id 1364001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1364001
8
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
9
reference_url https://access.redhat.com/errata/RHSA-2016:1781
reference_id RHSA-2016:1781
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1781
10
reference_url https://access.redhat.com/errata/RHSA-2016:1820
reference_id RHSA-2016:1820
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1820
11
reference_url https://access.redhat.com/errata/RHSA-2016:1821
reference_id RHSA-2016:1821
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1821
12
reference_url https://access.redhat.com/errata/RHSA-2016:2606
reference_id RHSA-2016:2606
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:2606
13
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
14
reference_url https://usn.ubuntu.com/3066-1/
reference_id USN-3066-1
reference_type
scores
url https://usn.ubuntu.com/3066-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.9
purl pkg:generic/postgresql@9.4.9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.9
1
url pkg:generic/postgresql@9.5.4
purl pkg:generic/postgresql@9.5.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.4
aliases CVE-2016-5423
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9b6v-1bt1-dfgy
8
url VCID-a3sh-4t1e-tbh4
vulnerability_id VCID-a3sh-4t1e-tbh4
summary An error in extended protocol message reading.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0244.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0244
reference_id
reference_type
scores
0
value 0.0108
scoring_system epss
scoring_elements 0.77867
published_at 2026-04-21T12:55:00Z
1
value 0.0108
scoring_system epss
scoring_elements 0.77778
published_at 2026-04-01T12:55:00Z
2
value 0.0108
scoring_system epss
scoring_elements 0.77784
published_at 2026-04-02T12:55:00Z
3
value 0.0108
scoring_system epss
scoring_elements 0.77811
published_at 2026-04-04T12:55:00Z
4
value 0.0108
scoring_system epss
scoring_elements 0.77794
published_at 2026-04-07T12:55:00Z
5
value 0.0108
scoring_system epss
scoring_elements 0.77822
published_at 2026-04-08T12:55:00Z
6
value 0.0108
scoring_system epss
scoring_elements 0.77827
published_at 2026-04-09T12:55:00Z
7
value 0.0108
scoring_system epss
scoring_elements 0.77854
published_at 2026-04-11T12:55:00Z
8
value 0.0108
scoring_system epss
scoring_elements 0.77838
published_at 2026-04-12T12:55:00Z
9
value 0.0108
scoring_system epss
scoring_elements 0.77837
published_at 2026-04-13T12:55:00Z
10
value 0.0108
scoring_system epss
scoring_elements 0.77874
published_at 2026-04-16T12:55:00Z
11
value 0.0108
scoring_system epss
scoring_elements 0.77872
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
6
reference_url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
7
reference_url https://www.postgresql.org/support/security/CVE-2015-0244/
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2015-0244/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1188694
reference_id 1188694
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1188694
9
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
10
reference_url https://access.redhat.com/errata/RHSA-2015:0699
reference_id RHSA-2015:0699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0699
11
reference_url https://access.redhat.com/errata/RHSA-2015:0750
reference_id RHSA-2015:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0750
12
reference_url https://access.redhat.com/errata/RHSA-2015:0856
reference_id RHSA-2015:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0856
13
reference_url https://usn.ubuntu.com/2499-1/
reference_id USN-2499-1
reference_type
scores
url https://usn.ubuntu.com/2499-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.1
purl pkg:generic/postgresql@9.4.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.1
aliases CVE-2015-0244
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a3sh-4t1e-tbh4
9
url VCID-bb5j-e9vw-mbd1
vulnerability_id VCID-bb5j-e9vw-mbd1
summary TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER executionmore details
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00043.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10208.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-10208
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40573
published_at 2026-04-01T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40563
published_at 2026-04-21T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40662
published_at 2026-04-09T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.4068
published_at 2026-04-11T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40643
published_at 2026-04-12T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-13T12:55:00Z
6
value 0.00188
scoring_system epss
scoring_elements 0.40671
published_at 2026-04-16T12:55:00Z
7
value 0.00188
scoring_system epss
scoring_elements 0.4064
published_at 2026-04-18T12:55:00Z
8
value 0.00188
scoring_system epss
scoring_elements 0.40654
published_at 2026-04-02T12:55:00Z
9
value 0.00188
scoring_system epss
scoring_elements 0.40682
published_at 2026-04-04T12:55:00Z
10
value 0.00188
scoring_system epss
scoring_elements 0.40603
published_at 2026-04-07T12:55:00Z
11
value 0.00188
scoring_system epss
scoring_elements 0.40653
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-10208
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10208
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10209
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://www.postgresql.org/about/news/1960/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1960/
8
reference_url https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-115-1010-9615-9519-9424-and-12-beta-3-released-1960/
9
reference_url https://www.postgresql.org/support/security/CVE-2019-10208/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2019-10208/
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1734416
reference_id 1734416
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1734416
11
reference_url https://security.archlinux.org/ASA-201908-7
reference_id ASA-201908-7
reference_type
scores
url https://security.archlinux.org/ASA-201908-7
12
reference_url https://security.archlinux.org/ASA-201908-8
reference_id ASA-201908-8
reference_type
scores
url https://security.archlinux.org/ASA-201908-8
13
reference_url https://security.archlinux.org/AVG-1019
reference_id AVG-1019
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1019
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-10208
reference_id CVE-2019-10208
reference_type
scores
0
value 6.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-10208
16
reference_url https://access.redhat.com/errata/RHSA-2020:0980
reference_id RHSA-2020:0980
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:0980
17
reference_url https://access.redhat.com/errata/RHSA-2020:3669
reference_id RHSA-2020:3669
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3669
18
reference_url https://access.redhat.com/errata/RHSA-2020:4295
reference_id RHSA-2020:4295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4295
19
reference_url https://access.redhat.com/errata/RHSA-2020:5619
reference_id RHSA-2020:5619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5619
20
reference_url https://access.redhat.com/errata/RHSA-2020:5661
reference_id RHSA-2020:5661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5661
21
reference_url https://access.redhat.com/errata/RHSA-2020:5664
reference_id RHSA-2020:5664
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5664
22
reference_url https://access.redhat.com/errata/RHSA-2021:0164
reference_id RHSA-2021:0164
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0164
23
reference_url https://access.redhat.com/errata/RHSA-2021:0166
reference_id RHSA-2021:0166
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0166
24
reference_url https://access.redhat.com/errata/RHSA-2021:0167
reference_id RHSA-2021:0167
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0167
25
reference_url https://access.redhat.com/errata/RHSA-2021:1512
reference_id RHSA-2021:1512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1512
26
reference_url https://usn.ubuntu.com/4090-1/
reference_id USN-4090-1
reference_type
scores
url https://usn.ubuntu.com/4090-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.24
purl pkg:generic/postgresql@9.4.24
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.24
1
url pkg:generic/postgresql@9.5.19
purl pkg:generic/postgresql@9.5.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.19
2
url pkg:generic/postgresql@9.6.15
purl pkg:generic/postgresql@9.6.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.15
3
url pkg:generic/postgresql@10.10.0
purl pkg:generic/postgresql@10.10.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.10.0
4
url pkg:generic/postgresql@11.5.0
purl pkg:generic/postgresql@11.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.5.0
aliases CVE-2019-10208
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bb5j-e9vw-mbd1
10
url VCID-bqag-mh3g-fqe7
vulnerability_id VCID-bqag-mh3g-fqe7
summary Unauthenticated users may gain access to the database server during "make check"..more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0067.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0067.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0067
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26463
published_at 2026-04-21T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26629
published_at 2026-04-01T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26675
published_at 2026-04-02T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26717
published_at 2026-04-04T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26502
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.2657
published_at 2026-04-08T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26619
published_at 2026-04-09T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26624
published_at 2026-04-11T12:55:00Z
8
value 0.00096
scoring_system epss
scoring_elements 0.26578
published_at 2026-04-12T12:55:00Z
9
value 0.00096
scoring_system epss
scoring_elements 0.26521
published_at 2026-04-13T12:55:00Z
10
value 0.00096
scoring_system epss
scoring_elements 0.26529
published_at 2026-04-16T12:55:00Z
11
value 0.00096
scoring_system epss
scoring_elements 0.26501
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0067
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2669
11
reference_url https://www.postgresql.org/support/security/CVE-2014-0067/
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements ['AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2014-0067/
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1065863
reference_id 1065863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1065863
fixed_packages
0
url pkg:generic/postgresql@9.4.1
purl pkg:generic/postgresql@9.4.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.1
aliases CVE-2014-0067
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bqag-mh3g-fqe7
11
url VCID-csfh-831q-rqfv
vulnerability_id VCID-csfh-831q-rqfv
summary pg_user_mappings view discloses passwords to users lacking server privilegesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7547.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7547.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7547
reference_id
reference_type
scores
0
value 0.01109
scoring_system epss
scoring_elements 0.7807
published_at 2026-04-01T12:55:00Z
1
value 0.01109
scoring_system epss
scoring_elements 0.7816
published_at 2026-04-16T12:55:00Z
2
value 0.01109
scoring_system epss
scoring_elements 0.78126
published_at 2026-04-13T12:55:00Z
3
value 0.01109
scoring_system epss
scoring_elements 0.7813
published_at 2026-04-12T12:55:00Z
4
value 0.01109
scoring_system epss
scoring_elements 0.78079
published_at 2026-04-02T12:55:00Z
5
value 0.01109
scoring_system epss
scoring_elements 0.78108
published_at 2026-04-04T12:55:00Z
6
value 0.01109
scoring_system epss
scoring_elements 0.78091
published_at 2026-04-07T12:55:00Z
7
value 0.01109
scoring_system epss
scoring_elements 0.78117
published_at 2026-04-08T12:55:00Z
8
value 0.01109
scoring_system epss
scoring_elements 0.78148
published_at 2026-04-11T12:55:00Z
9
value 0.01109
scoring_system epss
scoring_elements 0.78122
published_at 2026-04-09T12:55:00Z
10
value 0.01444
scoring_system epss
scoring_elements 0.80778
published_at 2026-04-21T12:55:00Z
11
value 0.01444
scoring_system epss
scoring_elements 0.80777
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7547
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:N
1
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2017-08-10-security-update-release-1772/
7
reference_url https://www.postgresql.org/support/security/CVE-2017-7547/
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2017-7547/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477185
reference_id 1477185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477185
9
reference_url https://security.archlinux.org/ASA-201709-2
reference_id ASA-201709-2
reference_type
scores
url https://security.archlinux.org/ASA-201709-2
10
reference_url https://security.archlinux.org/AVG-381
reference_id AVG-381
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-381
11
reference_url https://security.gentoo.org/glsa/201710-06
reference_id GLSA-201710-06
reference_type
scores
url https://security.gentoo.org/glsa/201710-06
12
reference_url https://access.redhat.com/errata/RHSA-2017:2677
reference_id RHSA-2017:2677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2677
13
reference_url https://access.redhat.com/errata/RHSA-2017:2678
reference_id RHSA-2017:2678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2678
14
reference_url https://access.redhat.com/errata/RHSA-2017:2728
reference_id RHSA-2017:2728
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2728
15
reference_url https://usn.ubuntu.com/3390-1/
reference_id USN-3390-1
reference_type
scores
url https://usn.ubuntu.com/3390-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.13
purl pkg:generic/postgresql@9.4.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.13
1
url pkg:generic/postgresql@9.5.8
purl pkg:generic/postgresql@9.5.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.8
2
url pkg:generic/postgresql@9.6.4
purl pkg:generic/postgresql@9.6.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.4
aliases CVE-2017-7547
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-831q-rqfv
12
url VCID-d362-bmcf-3kdz
vulnerability_id VCID-d362-bmcf-3kdz
summary Memory disclosure in JSON functionsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15098.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15098
reference_id
reference_type
scores
0
value 0.00864
scoring_system epss
scoring_elements 0.75049
published_at 2026-04-01T12:55:00Z
1
value 0.00864
scoring_system epss
scoring_elements 0.75128
published_at 2026-04-21T12:55:00Z
2
value 0.00864
scoring_system epss
scoring_elements 0.75092
published_at 2026-04-08T12:55:00Z
3
value 0.00864
scoring_system epss
scoring_elements 0.75103
published_at 2026-04-09T12:55:00Z
4
value 0.00864
scoring_system epss
scoring_elements 0.75125
published_at 2026-04-11T12:55:00Z
5
value 0.00864
scoring_system epss
scoring_elements 0.75104
published_at 2026-04-12T12:55:00Z
6
value 0.00864
scoring_system epss
scoring_elements 0.75094
published_at 2026-04-13T12:55:00Z
7
value 0.00864
scoring_system epss
scoring_elements 0.75132
published_at 2026-04-16T12:55:00Z
8
value 0.00864
scoring_system epss
scoring_elements 0.75139
published_at 2026-04-18T12:55:00Z
9
value 0.00864
scoring_system epss
scoring_elements 0.75052
published_at 2026-04-02T12:55:00Z
10
value 0.00864
scoring_system epss
scoring_elements 0.75082
published_at 2026-04-04T12:55:00Z
11
value 0.00864
scoring_system epss
scoring_elements 0.75058
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15098
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15098
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15099
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
1
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.debian.org/security/2017/dsa-4027
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4027
6
reference_url https://www.debian.org/security/2017/dsa-4028
reference_id
reference_type
scores
url https://www.debian.org/security/2017/dsa-4028
7
reference_url https://www.postgresql.org/about/news/1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1801/
8
reference_url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
9
reference_url https://www.postgresql.org/support/security/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/
10
reference_url https://www.postgresql.org/support/security/CVE-2017-15098/
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2017-15098/
11
reference_url http://www.securityfocus.com/bid/101781
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101781
12
reference_url http://www.securitytracker.com/id/1039752
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039752
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1508820
reference_id 1508820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1508820
14
reference_url https://security.archlinux.org/ASA-201711-17
reference_id ASA-201711-17
reference_type
scores
url https://security.archlinux.org/ASA-201711-17
15
reference_url https://security.archlinux.org/ASA-201711-18
reference_id ASA-201711-18
reference_type
scores
url https://security.archlinux.org/ASA-201711-18
16
reference_url https://security.archlinux.org/AVG-485
reference_id AVG-485
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-485
17
reference_url https://security.archlinux.org/AVG-486
reference_id AVG-486
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-486
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15098
reference_id CVE-2017-15098
reference_type
scores
0
value 5.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:P/I:N/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-15098
72
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
73
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
74
reference_url https://usn.ubuntu.com/3479-1/
reference_id USN-3479-1
reference_type
scores
url https://usn.ubuntu.com/3479-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.15
purl pkg:generic/postgresql@9.4.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.15
1
url pkg:generic/postgresql@9.5.10
purl pkg:generic/postgresql@9.5.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.10
2
url pkg:generic/postgresql@9.6.6
purl pkg:generic/postgresql@9.6.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.6
3
url pkg:generic/postgresql@10.1.0
purl pkg:generic/postgresql@10.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0
aliases CVE-2017-15098
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d362-bmcf-3kdz
13
url VCID-esps-vak5-bqcp
vulnerability_id VCID-esps-vak5-bqcp
summary Unchecked JSON input can crash the servermore details
references
0
reference_url http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
reference_id
reference_type
scores
url http://git.postgresql.org/gitweb/?p=postgresql.git%3Ba=commit%3Bh=08fa47c4850cea32c3116665975bca219fbf2fe6
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5289.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5289.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5289
reference_id
reference_type
scores
0
value 0.09972
scoring_system epss
scoring_elements 0.93062
published_at 2026-04-21T12:55:00Z
1
value 0.09972
scoring_system epss
scoring_elements 0.93013
published_at 2026-04-01T12:55:00Z
2
value 0.09972
scoring_system epss
scoring_elements 0.93052
published_at 2026-04-16T12:55:00Z
3
value 0.09972
scoring_system epss
scoring_elements 0.93055
published_at 2026-04-18T12:55:00Z
4
value 0.09972
scoring_system epss
scoring_elements 0.93022
published_at 2026-04-02T12:55:00Z
5
value 0.09972
scoring_system epss
scoring_elements 0.93026
published_at 2026-04-04T12:55:00Z
6
value 0.09972
scoring_system epss
scoring_elements 0.93025
published_at 2026-04-07T12:55:00Z
7
value 0.09972
scoring_system epss
scoring_elements 0.93033
published_at 2026-04-08T12:55:00Z
8
value 0.09972
scoring_system epss
scoring_elements 0.93038
published_at 2026-04-09T12:55:00Z
9
value 0.09972
scoring_system epss
scoring_elements 0.93043
published_at 2026-04-11T12:55:00Z
10
value 0.09972
scoring_system epss
scoring_elements 0.9304
published_at 2026-04-12T12:55:00Z
11
value 0.09972
scoring_system epss
scoring_elements 0.93042
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5289
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
9
reference_url https://www.postgresql.org/about/news/2015-10-08-security-update-release-1615/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2015-10-08-security-update-release-1615/
10
reference_url https://www.postgresql.org/support/security/CVE-2015-5289/
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H']
url https://www.postgresql.org/support/security/CVE-2015-5289/
11
reference_url http://www.debian.org/security/2015/dsa-3374
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3374
12
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
13
reference_url http://www.postgresql.org/about/news/1615/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1615/
14
reference_url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
15
reference_url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
16
reference_url http://www.securityfocus.com/bid/77048
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77048
17
reference_url http://www.securitytracker.com/id/1033775
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033775
18
reference_url http://www.ubuntu.com/usn/USN-2772-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2772-1
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1270312
reference_id 1270312
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1270312
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5289
reference_id CVE-2015-5289
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5289
27
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
28
reference_url https://access.redhat.com/errata/RHSA-2015:2077
reference_id RHSA-2015:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2077
29
reference_url https://access.redhat.com/errata/RHSA-2015:2078
reference_id RHSA-2015:2078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2078
30
reference_url https://access.redhat.com/errata/RHSA-2015:2083
reference_id RHSA-2015:2083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2083
31
reference_url https://usn.ubuntu.com/2772-1/
reference_id USN-2772-1
reference_type
scores
url https://usn.ubuntu.com/2772-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.5
purl pkg:generic/postgresql@9.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.5
aliases CVE-2015-5289
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-esps-vak5-bqcp
14
url VCID-f976-dd3s-fuc8
vulnerability_id VCID-f976-dd3s-fuc8
summary Memory errors in functions in the pgcrypto extension.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0243.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0243
reference_id
reference_type
scores
0
value 0.06713
scoring_system epss
scoring_elements 0.91282
published_at 2026-04-21T12:55:00Z
1
value 0.06713
scoring_system epss
scoring_elements 0.91206
published_at 2026-04-01T12:55:00Z
2
value 0.06713
scoring_system epss
scoring_elements 0.9121
published_at 2026-04-02T12:55:00Z
3
value 0.06713
scoring_system epss
scoring_elements 0.91219
published_at 2026-04-04T12:55:00Z
4
value 0.06713
scoring_system epss
scoring_elements 0.91226
published_at 2026-04-07T12:55:00Z
5
value 0.06713
scoring_system epss
scoring_elements 0.91239
published_at 2026-04-08T12:55:00Z
6
value 0.06713
scoring_system epss
scoring_elements 0.91246
published_at 2026-04-09T12:55:00Z
7
value 0.06713
scoring_system epss
scoring_elements 0.91252
published_at 2026-04-11T12:55:00Z
8
value 0.06713
scoring_system epss
scoring_elements 0.91256
published_at 2026-04-12T12:55:00Z
9
value 0.06713
scoring_system epss
scoring_elements 0.91255
published_at 2026-04-13T12:55:00Z
10
value 0.06713
scoring_system epss
scoring_elements 0.9128
published_at 2026-04-16T12:55:00Z
11
value 0.06713
scoring_system epss
scoring_elements 0.91279
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
6
reference_url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
7
reference_url https://www.postgresql.org/support/security/CVE-2015-0243/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H']
url https://www.postgresql.org/support/security/CVE-2015-0243/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1188689
reference_id 1188689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1188689
9
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
10
reference_url https://access.redhat.com/errata/RHSA-2015:0699
reference_id RHSA-2015:0699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0699
11
reference_url https://access.redhat.com/errata/RHSA-2015:0750
reference_id RHSA-2015:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0750
12
reference_url https://access.redhat.com/errata/RHSA-2015:0856
reference_id RHSA-2015:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0856
13
reference_url https://usn.ubuntu.com/2499-1/
reference_id USN-2499-1
reference_type
scores
url https://usn.ubuntu.com/2499-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.1
purl pkg:generic/postgresql@9.4.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.1
aliases CVE-2015-0243
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f976-dd3s-fuc8
15
url VCID-fd5z-bj21-m3a5
vulnerability_id VCID-fd5z-bj21-m3a5
summary Memory leak in crypt() function.more details
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172316.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169094.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00033.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00040.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5288.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5288.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5288
reference_id
reference_type
scores
0
value 0.08949
scoring_system epss
scoring_elements 0.92611
published_at 2026-04-21T12:55:00Z
1
value 0.08949
scoring_system epss
scoring_elements 0.92558
published_at 2026-04-01T12:55:00Z
2
value 0.08949
scoring_system epss
scoring_elements 0.92596
published_at 2026-04-12T12:55:00Z
3
value 0.08949
scoring_system epss
scoring_elements 0.92608
published_at 2026-04-16T12:55:00Z
4
value 0.08949
scoring_system epss
scoring_elements 0.92607
published_at 2026-04-18T12:55:00Z
5
value 0.08949
scoring_system epss
scoring_elements 0.92564
published_at 2026-04-02T12:55:00Z
6
value 0.08949
scoring_system epss
scoring_elements 0.92571
published_at 2026-04-04T12:55:00Z
7
value 0.08949
scoring_system epss
scoring_elements 0.92573
published_at 2026-04-07T12:55:00Z
8
value 0.08949
scoring_system epss
scoring_elements 0.92585
published_at 2026-04-08T12:55:00Z
9
value 0.08949
scoring_system epss
scoring_elements 0.92589
published_at 2026-04-09T12:55:00Z
10
value 0.08949
scoring_system epss
scoring_elements 0.92595
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5288
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://www.postgresql.org/about/news/postgresql-95-beta-1-released-1614/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-95-beta-1-released-1614/
13
reference_url https://www.postgresql.org/support/security/CVE-2015-5288/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2015-5288/
14
reference_url http://www.debian.org/security/2015/dsa-3374
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3374
15
reference_url http://www.debian.org/security/2016/dsa-3475
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3475
16
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
17
reference_url http://www.postgresql.org/about/news/1615/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1615/
18
reference_url http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.0/static/release-9-0-23.html
19
reference_url http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.1/static/release-9-1-19.html
20
reference_url http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.2/static/release-9-2-14.html
21
reference_url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.3/static/release-9-3-10.html
22
reference_url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/9.4/static/release-9-4-5.html
23
reference_url http://www.securityfocus.com/bid/77049
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77049
24
reference_url http://www.securitytracker.com/id/1033775
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1033775
25
reference_url http://www.ubuntu.com/usn/USN-2772-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2772-1
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1270306
reference_id 1270306
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1270306
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.10:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.11:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.12:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.13:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.14:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.15:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.16:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.17:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.18:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.1.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.0:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5288
reference_id CVE-2015-5288
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5288
77
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
78
reference_url https://access.redhat.com/errata/RHSA-2015:2077
reference_id RHSA-2015:2077
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2077
79
reference_url https://access.redhat.com/errata/RHSA-2015:2078
reference_id RHSA-2015:2078
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2078
80
reference_url https://access.redhat.com/errata/RHSA-2015:2081
reference_id RHSA-2015:2081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2081
81
reference_url https://access.redhat.com/errata/RHSA-2015:2083
reference_id RHSA-2015:2083
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2083
82
reference_url https://usn.ubuntu.com/2772-1/
reference_id USN-2772-1
reference_type
scores
url https://usn.ubuntu.com/2772-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.5
purl pkg:generic/postgresql@9.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.5
aliases CVE-2015-5288
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fd5z-bj21-m3a5
16
url VCID-k38h-5crc-u3hr
vulnerability_id VCID-k38h-5crc-u3hr
summary Buffer overrun in replacement printf family of functions.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0242.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0242.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0242
reference_id
reference_type
scores
0
value 0.03377
scoring_system epss
scoring_elements 0.87391
published_at 2026-04-21T12:55:00Z
1
value 0.03377
scoring_system epss
scoring_elements 0.87325
published_at 2026-04-01T12:55:00Z
2
value 0.03377
scoring_system epss
scoring_elements 0.87335
published_at 2026-04-02T12:55:00Z
3
value 0.03377
scoring_system epss
scoring_elements 0.87351
published_at 2026-04-07T12:55:00Z
4
value 0.03377
scoring_system epss
scoring_elements 0.87369
published_at 2026-04-08T12:55:00Z
5
value 0.03377
scoring_system epss
scoring_elements 0.87376
published_at 2026-04-09T12:55:00Z
6
value 0.03377
scoring_system epss
scoring_elements 0.87389
published_at 2026-04-11T12:55:00Z
7
value 0.03377
scoring_system epss
scoring_elements 0.87383
published_at 2026-04-12T12:55:00Z
8
value 0.03377
scoring_system epss
scoring_elements 0.87379
published_at 2026-04-13T12:55:00Z
9
value 0.03377
scoring_system epss
scoring_elements 0.87394
published_at 2026-04-16T12:55:00Z
10
value 0.03377
scoring_system epss
scoring_elements 0.87397
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0242
2
reference_url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
3
reference_url https://www.postgresql.org/support/security/CVE-2015-0242/
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2015-0242/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1188688
reference_id 1188688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1188688
5
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
fixed_packages
0
url pkg:generic/postgresql@9.4.1
purl pkg:generic/postgresql@9.4.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.1
aliases CVE-2015-0242
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k38h-5crc-u3hr
17
url VCID-mebz-9qb7-5bd2
vulnerability_id VCID-mebz-9qb7-5bd2
summary Double "free" after authentication timeoutmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3165.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3165.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3165
reference_id
reference_type
scores
0
value 0.0971
scoring_system epss
scoring_elements 0.92952
published_at 2026-04-21T12:55:00Z
1
value 0.0971
scoring_system epss
scoring_elements 0.92906
published_at 2026-04-01T12:55:00Z
2
value 0.0971
scoring_system epss
scoring_elements 0.92914
published_at 2026-04-02T12:55:00Z
3
value 0.0971
scoring_system epss
scoring_elements 0.92918
published_at 2026-04-04T12:55:00Z
4
value 0.0971
scoring_system epss
scoring_elements 0.92917
published_at 2026-04-07T12:55:00Z
5
value 0.0971
scoring_system epss
scoring_elements 0.92925
published_at 2026-04-08T12:55:00Z
6
value 0.0971
scoring_system epss
scoring_elements 0.9293
published_at 2026-04-09T12:55:00Z
7
value 0.0971
scoring_system epss
scoring_elements 0.92935
published_at 2026-04-11T12:55:00Z
8
value 0.0971
scoring_system epss
scoring_elements 0.92933
published_at 2026-04-12T12:55:00Z
9
value 0.0971
scoring_system epss
scoring_elements 0.92934
published_at 2026-04-13T12:55:00Z
10
value 0.0971
scoring_system epss
scoring_elements 0.92944
published_at 2026-04-16T12:55:00Z
11
value 0.0971
scoring_system epss
scoring_elements 0.92946
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3165
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3165
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3166
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3167
5
reference_url https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-942-937-9211-9116-and-9020-released-1587/
6
reference_url https://www.postgresql.org/support/security/CVE-2015-3165/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H']
url https://www.postgresql.org/support/security/CVE-2015-3165/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1221537
reference_id 1221537
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1221537
8
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
9
reference_url https://access.redhat.com/errata/RHSA-2015:1194
reference_id RHSA-2015:1194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1194
10
reference_url https://access.redhat.com/errata/RHSA-2015:1195
reference_id RHSA-2015:1195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1195
11
reference_url https://access.redhat.com/errata/RHSA-2015:1196
reference_id RHSA-2015:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1196
12
reference_url https://usn.ubuntu.com/2621-1/
reference_id USN-2621-1
reference_type
scores
url https://usn.ubuntu.com/2621-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.2
purl pkg:generic/postgresql@9.4.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.2
aliases CVE-2015-3165
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mebz-9qb7-5bd2
18
url VCID-qn5k-y64c-7ffc
vulnerability_id VCID-qn5k-y64c-7ffc
summary pg_user_mappings view discloses foreign server passwordsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7486.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7486.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7486
reference_id
reference_type
scores
0
value 0.04182
scoring_system epss
scoring_elements 0.88653
published_at 2026-04-01T12:55:00Z
1
value 0.04182
scoring_system epss
scoring_elements 0.88718
published_at 2026-04-21T12:55:00Z
2
value 0.04182
scoring_system epss
scoring_elements 0.88709
published_at 2026-04-13T12:55:00Z
3
value 0.04182
scoring_system epss
scoring_elements 0.88722
published_at 2026-04-16T12:55:00Z
4
value 0.04182
scoring_system epss
scoring_elements 0.8872
published_at 2026-04-18T12:55:00Z
5
value 0.04182
scoring_system epss
scoring_elements 0.88662
published_at 2026-04-02T12:55:00Z
6
value 0.04182
scoring_system epss
scoring_elements 0.88679
published_at 2026-04-04T12:55:00Z
7
value 0.04182
scoring_system epss
scoring_elements 0.8868
published_at 2026-04-07T12:55:00Z
8
value 0.04182
scoring_system epss
scoring_elements 0.88697
published_at 2026-04-08T12:55:00Z
9
value 0.04182
scoring_system epss
scoring_elements 0.88703
published_at 2026-04-09T12:55:00Z
10
value 0.04182
scoring_system epss
scoring_elements 0.88715
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7486
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7485
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2017-05-11-security-update-release-1746/
7
reference_url https://www.postgresql.org/support/security/CVE-2017-7486/
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2017-7486/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1448089
reference_id 1448089
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1448089
9
reference_url https://security.archlinux.org/ASA-201705-23
reference_id ASA-201705-23
reference_type
scores
url https://security.archlinux.org/ASA-201705-23
10
reference_url https://security.archlinux.org/AVG-272
reference_id AVG-272
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-272
11
reference_url https://security.gentoo.org/glsa/201710-06
reference_id GLSA-201710-06
reference_type
scores
url https://security.gentoo.org/glsa/201710-06
12
reference_url https://access.redhat.com/errata/RHSA-2017:1677
reference_id RHSA-2017:1677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1677
13
reference_url https://access.redhat.com/errata/RHSA-2017:1678
reference_id RHSA-2017:1678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1678
14
reference_url https://access.redhat.com/errata/RHSA-2017:1838
reference_id RHSA-2017:1838
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1838
15
reference_url https://access.redhat.com/errata/RHSA-2017:1983
reference_id RHSA-2017:1983
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1983
16
reference_url https://access.redhat.com/errata/RHSA-2017:2425
reference_id RHSA-2017:2425
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2425
fixed_packages
0
url pkg:generic/postgresql@9.4.12
purl pkg:generic/postgresql@9.4.12
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.12
1
url pkg:generic/postgresql@9.5.7
purl pkg:generic/postgresql@9.5.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.7
2
url pkg:generic/postgresql@9.6.3
purl pkg:generic/postgresql@9.6.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.3
aliases CVE-2017-7486
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qn5k-y64c-7ffc
19
url VCID-qnt9-qr7p-wkhy
vulnerability_id VCID-qnt9-qr7p-wkhy
summary Start scripts permit database administrator to modify root-owned filesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12172.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12172
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16401
published_at 2026-04-01T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16467
published_at 2026-04-21T12:55:00Z
2
value 0.00053
scoring_system epss
scoring_elements 0.16532
published_at 2026-04-08T12:55:00Z
3
value 0.00053
scoring_system epss
scoring_elements 0.16586
published_at 2026-04-09T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16567
published_at 2026-04-11T12:55:00Z
5
value 0.00053
scoring_system epss
scoring_elements 0.16527
published_at 2026-04-12T12:55:00Z
6
value 0.00053
scoring_system epss
scoring_elements 0.16469
published_at 2026-04-13T12:55:00Z
7
value 0.00053
scoring_system epss
scoring_elements 0.1641
published_at 2026-04-16T12:55:00Z
8
value 0.00053
scoring_system epss
scoring_elements 0.1643
published_at 2026-04-18T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16583
published_at 2026-04-02T12:55:00Z
10
value 0.00053
scoring_system epss
scoring_elements 0.16646
published_at 2026-04-04T12:55:00Z
11
value 0.00053
scoring_system epss
scoring_elements 0.16446
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12172
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:S/C:C/I:C/A:C
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/1801/
4
reference_url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
5
reference_url https://www.postgresql.org/support/security/
reference_id
reference_type
scores
url https://www.postgresql.org/support/security/
6
reference_url https://www.postgresql.org/support/security/CVE-2017-12172/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2017-12172/
7
reference_url http://www.securityfocus.com/bid/101949
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/101949
8
reference_url http://www.securitytracker.com/id/1039752
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1039752
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1498394
reference_id 1498394
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1498394
10
reference_url https://security.archlinux.org/AVG-487
reference_id AVG-487
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-487
11
reference_url https://security.archlinux.org/AVG-488
reference_id AVG-488
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-488
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:10:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.15:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.16:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.17:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.18:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.19:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.20:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.21:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.23:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.10:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.11:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.12:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.13:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.14:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.15:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.16:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.17:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.18:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.19:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.6:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.3.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.13:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.14:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12172
reference_id CVE-2017-12172
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-12172
89
reference_url https://access.redhat.com/errata/RHSA-2017:3402
reference_id RHSA-2017:3402
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3402
90
reference_url https://access.redhat.com/errata/RHSA-2017:3403
reference_id RHSA-2017:3403
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3403
91
reference_url https://access.redhat.com/errata/RHSA-2017:3404
reference_id RHSA-2017:3404
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3404
92
reference_url https://access.redhat.com/errata/RHSA-2017:3405
reference_id RHSA-2017:3405
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3405
fixed_packages
0
url pkg:generic/postgresql@9.4.15
purl pkg:generic/postgresql@9.4.15
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.15
1
url pkg:generic/postgresql@9.5.10
purl pkg:generic/postgresql@9.5.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.10
2
url pkg:generic/postgresql@9.6.6
purl pkg:generic/postgresql@9.6.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.6
3
url pkg:generic/postgresql@10.1.0
purl pkg:generic/postgresql@10.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.1.0
aliases CVE-2017-12172
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qnt9-qr7p-wkhy
20
url VCID-raqj-ezua-skeb
vulnerability_id VCID-raqj-ezua-skeb
summary Buffer overruns in "to_char" functions.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0241.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0241.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0241
reference_id
reference_type
scores
0
value 0.06301
scoring_system epss
scoring_elements 0.90979
published_at 2026-04-18T12:55:00Z
1
value 0.06301
scoring_system epss
scoring_elements 0.90906
published_at 2026-04-01T12:55:00Z
2
value 0.06301
scoring_system epss
scoring_elements 0.90911
published_at 2026-04-02T12:55:00Z
3
value 0.06301
scoring_system epss
scoring_elements 0.90921
published_at 2026-04-04T12:55:00Z
4
value 0.06301
scoring_system epss
scoring_elements 0.90931
published_at 2026-04-07T12:55:00Z
5
value 0.06301
scoring_system epss
scoring_elements 0.90942
published_at 2026-04-08T12:55:00Z
6
value 0.06301
scoring_system epss
scoring_elements 0.90948
published_at 2026-04-09T12:55:00Z
7
value 0.06301
scoring_system epss
scoring_elements 0.90957
published_at 2026-04-13T12:55:00Z
8
value 0.06301
scoring_system epss
scoring_elements 0.90958
published_at 2026-04-12T12:55:00Z
9
value 0.06301
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0241
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
6
reference_url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-941-936-9210-9115-9019-released-1569/
7
reference_url https://www.postgresql.org/support/security/CVE-2015-0241/
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2015-0241/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1188684
reference_id 1188684
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1188684
9
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
10
reference_url https://access.redhat.com/errata/RHSA-2015:0699
reference_id RHSA-2015:0699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0699
11
reference_url https://access.redhat.com/errata/RHSA-2015:0750
reference_id RHSA-2015:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0750
12
reference_url https://access.redhat.com/errata/RHSA-2015:0856
reference_id RHSA-2015:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0856
13
reference_url https://usn.ubuntu.com/2499-1/
reference_id USN-2499-1
reference_type
scores
url https://usn.ubuntu.com/2499-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.1
purl pkg:generic/postgresql@9.4.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.1
aliases CVE-2015-0241
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-raqj-ezua-skeb
21
url VCID-sq2s-cvrs-7uhh
vulnerability_id VCID-sq2s-cvrs-7uhh
summary Certain host connection parameters defeat client-side security defensesmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10915
reference_id
reference_type
scores
0
value 0.01753
scoring_system epss
scoring_elements 0.82502
published_at 2026-04-01T12:55:00Z
1
value 0.01753
scoring_system epss
scoring_elements 0.82608
published_at 2026-04-21T12:55:00Z
2
value 0.01753
scoring_system epss
scoring_elements 0.82566
published_at 2026-04-13T12:55:00Z
3
value 0.01753
scoring_system epss
scoring_elements 0.82603
published_at 2026-04-18T12:55:00Z
4
value 0.01753
scoring_system epss
scoring_elements 0.82516
published_at 2026-04-02T12:55:00Z
5
value 0.01753
scoring_system epss
scoring_elements 0.82531
published_at 2026-04-04T12:55:00Z
6
value 0.01753
scoring_system epss
scoring_elements 0.82527
published_at 2026-04-07T12:55:00Z
7
value 0.01753
scoring_system epss
scoring_elements 0.82553
published_at 2026-04-08T12:55:00Z
8
value 0.01753
scoring_system epss
scoring_elements 0.8256
published_at 2026-04-09T12:55:00Z
9
value 0.01753
scoring_system epss
scoring_elements 0.82579
published_at 2026-04-11T12:55:00Z
10
value 0.01753
scoring_system epss
scoring_elements 0.82572
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10925
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-105-9610-9514-9419-9324-and-11-beta-3-released-1878/
6
reference_url https://www.postgresql.org/support/security/CVE-2018-10915/
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-10915/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1609891
reference_id 1609891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1609891
8
reference_url https://security.gentoo.org/glsa/201810-08
reference_id GLSA-201810-08
reference_type
scores
url https://security.gentoo.org/glsa/201810-08
9
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
10
reference_url https://access.redhat.com/errata/RHSA-2018:2557
reference_id RHSA-2018:2557
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2557
11
reference_url https://access.redhat.com/errata/RHSA-2018:2565
reference_id RHSA-2018:2565
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2565
12
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
13
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
14
reference_url https://usn.ubuntu.com/3744-1/
reference_id USN-3744-1
reference_type
scores
url https://usn.ubuntu.com/3744-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.19
purl pkg:generic/postgresql@9.4.19
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.19
1
url pkg:generic/postgresql@9.5.14
purl pkg:generic/postgresql@9.5.14
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.14
2
url pkg:generic/postgresql@9.6.10
purl pkg:generic/postgresql@9.6.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.10
3
url pkg:generic/postgresql@10.5.0
purl pkg:generic/postgresql@10.5.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.5.0
aliases CVE-2018-10915
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sq2s-cvrs-7uhh
22
url VCID-t864-ytjh-nyg1
vulnerability_id VCID-t864-ytjh-nyg1
summary Unchecked regex can crash the servermore details
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177820.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177878.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html
7
reference_url http://rhn.redhat.com/errata/RHSA-2016-1060.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-1060.html
8
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0773.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0773.json
9
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0773
reference_id
reference_type
scores
0
value 0.12452
scoring_system epss
scoring_elements 0.93935
published_at 2026-04-21T12:55:00Z
1
value 0.12452
scoring_system epss
scoring_elements 0.9387
published_at 2026-04-01T12:55:00Z
2
value 0.12452
scoring_system epss
scoring_elements 0.93907
published_at 2026-04-13T12:55:00Z
3
value 0.12452
scoring_system epss
scoring_elements 0.93908
published_at 2026-04-12T12:55:00Z
4
value 0.12452
scoring_system epss
scoring_elements 0.93929
published_at 2026-04-16T12:55:00Z
5
value 0.12452
scoring_system epss
scoring_elements 0.93934
published_at 2026-04-18T12:55:00Z
6
value 0.12452
scoring_system epss
scoring_elements 0.93879
published_at 2026-04-02T12:55:00Z
7
value 0.12452
scoring_system epss
scoring_elements 0.93888
published_at 2026-04-04T12:55:00Z
8
value 0.12452
scoring_system epss
scoring_elements 0.93891
published_at 2026-04-07T12:55:00Z
9
value 0.12452
scoring_system epss
scoring_elements 0.939
published_at 2026-04-08T12:55:00Z
10
value 0.12452
scoring_system epss
scoring_elements 0.93904
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0773
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10152
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10152
15
reference_url https://puppet.com/security/cve/CVE-2016-0773
reference_id
reference_type
scores
url https://puppet.com/security/cve/CVE-2016-0773
16
reference_url https://www.postgresql.org/about/news/2016-02-11-security-update-release-1644/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/2016-02-11-security-update-release-1644/
17
reference_url https://www.postgresql.org/support/security/CVE-2016-0773/
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H']
url https://www.postgresql.org/support/security/CVE-2016-0773/
18
reference_url http://www.debian.org/security/2016/dsa-3475
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3475
19
reference_url http://www.debian.org/security/2016/dsa-3476
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3476
20
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
21
reference_url http://www.postgresql.org/about/news/1644/
reference_id
reference_type
scores
url http://www.postgresql.org/about/news/1644/
22
reference_url http://www.postgresql.org/docs/current/static/release-9-1-20.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-1-20.html
23
reference_url http://www.postgresql.org/docs/current/static/release-9-2-15.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-2-15.html
24
reference_url http://www.postgresql.org/docs/current/static/release-9-3-11.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-3-11.html
25
reference_url http://www.postgresql.org/docs/current/static/release-9-4-6.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-4-6.html
26
reference_url http://www.postgresql.org/docs/current/static/release-9-5-1.html
reference_id
reference_type
scores
url http://www.postgresql.org/docs/current/static/release-9-5-1.html
27
reference_url http://www.securityfocus.com/bid/83184
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83184
28
reference_url http://www.securitytracker.com/id/1035005
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1035005
29
reference_url http://www.ubuntu.com/usn/USN-2894-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2894-1
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1303832
reference_id 1303832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1303832
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.10:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.11:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.12:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.13:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.14:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.3:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.4:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.5:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.6:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.7:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.8:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.2.9:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0773
reference_id CVE-2016-0773
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-0773
60
reference_url https://security.gentoo.org/glsa/201701-33
reference_id GLSA-201701-33
reference_type
scores
url https://security.gentoo.org/glsa/201701-33
61
reference_url https://access.redhat.com/errata/RHSA-2016:0346
reference_id RHSA-2016:0346
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0346
62
reference_url https://access.redhat.com/errata/RHSA-2016:0347
reference_id RHSA-2016:0347
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0347
63
reference_url https://access.redhat.com/errata/RHSA-2016:0348
reference_id RHSA-2016:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0348
64
reference_url https://access.redhat.com/errata/RHSA-2016:0349
reference_id RHSA-2016:0349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0349
65
reference_url https://access.redhat.com/errata/RHSA-2016:1060
reference_id RHSA-2016:1060
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1060
66
reference_url https://usn.ubuntu.com/2894-1/
reference_id USN-2894-1
reference_type
scores
url https://usn.ubuntu.com/2894-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.6
purl pkg:generic/postgresql@9.4.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.6
1
url pkg:generic/postgresql@9.5.1
purl pkg:generic/postgresql@9.5.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.1
aliases CVE-2016-0773
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t864-ytjh-nyg1
23
url VCID-um7d-pzhb-n3c9
vulnerability_id VCID-um7d-pzhb-n3c9
summary lo_put() function ignores ACLsmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7548.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7548.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7548
reference_id
reference_type
scores
0
value 0.00749
scoring_system epss
scoring_elements 0.73074
published_at 2026-04-01T12:55:00Z
1
value 0.00749
scoring_system epss
scoring_elements 0.7317
published_at 2026-04-21T12:55:00Z
2
value 0.00749
scoring_system epss
scoring_elements 0.73132
published_at 2026-04-12T12:55:00Z
3
value 0.00749
scoring_system epss
scoring_elements 0.73125
published_at 2026-04-13T12:55:00Z
4
value 0.00749
scoring_system epss
scoring_elements 0.73168
published_at 2026-04-16T12:55:00Z
5
value 0.00749
scoring_system epss
scoring_elements 0.73178
published_at 2026-04-18T12:55:00Z
6
value 0.00749
scoring_system epss
scoring_elements 0.73083
published_at 2026-04-02T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73104
published_at 2026-04-04T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73078
published_at 2026-04-07T12:55:00Z
9
value 0.00749
scoring_system epss
scoring_elements 0.73114
published_at 2026-04-08T12:55:00Z
10
value 0.00749
scoring_system epss
scoring_elements 0.73127
published_at 2026-04-09T12:55:00Z
11
value 0.00749
scoring_system epss
scoring_elements 0.73152
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7548
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7548
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:S/C:C/I:C/A:N
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-101-966-9510-9415-9320-and-9224-released-1801/
7
reference_url https://www.postgresql.org/support/security/CVE-2017-7548/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N']
url https://www.postgresql.org/support/security/CVE-2017-7548/
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1477187
reference_id 1477187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1477187
9
reference_url https://security.archlinux.org/ASA-201709-2
reference_id ASA-201709-2
reference_type
scores
url https://security.archlinux.org/ASA-201709-2
10
reference_url https://security.archlinux.org/AVG-381
reference_id AVG-381
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-381
11
reference_url https://security.gentoo.org/glsa/201710-06
reference_id GLSA-201710-06
reference_type
scores
url https://security.gentoo.org/glsa/201710-06
12
reference_url https://access.redhat.com/errata/RHSA-2017:2677
reference_id RHSA-2017:2677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2677
13
reference_url https://access.redhat.com/errata/RHSA-2017:2678
reference_id RHSA-2017:2678
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2678
14
reference_url https://usn.ubuntu.com/3390-1/
reference_id USN-3390-1
reference_type
scores
url https://usn.ubuntu.com/3390-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.13
purl pkg:generic/postgresql@9.4.13
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.13
1
url pkg:generic/postgresql@9.5.8
purl pkg:generic/postgresql@9.5.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.8
2
url pkg:generic/postgresql@9.6.4
purl pkg:generic/postgresql@9.6.4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.4
aliases CVE-2017-7548
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-um7d-pzhb-n3c9
24
url VCID-wcsh-zz5q-qqbf
vulnerability_id VCID-wcsh-zz5q-qqbf
summary pg_upgrade creates file of sensitive metadata under prevailing umaskmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1053.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1053
reference_id
reference_type
scores
0
value 0.00073
scoring_system epss
scoring_elements 0.22014
published_at 2026-04-01T12:55:00Z
1
value 0.00073
scoring_system epss
scoring_elements 0.22084
published_at 2026-04-08T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22172
published_at 2026-04-02T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.2222
published_at 2026-04-04T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-07T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22139
published_at 2026-04-09T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24301
published_at 2026-04-21T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24338
published_at 2026-04-16T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24327
published_at 2026-04-18T12:55:00Z
9
value 0.00083
scoring_system epss
scoring_elements 0.24419
published_at 2026-04-11T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.24377
published_at 2026-04-12T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24321
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1053
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-102-967-9511-9416-and-9321-released-1829/
4
reference_url https://www.postgresql.org/support/security/CVE-2018-1053/
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements ['AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2018-1053/
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1539619
reference_id 1539619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1539619
6
reference_url https://access.redhat.com/errata/RHSA-2018:2511
reference_id RHSA-2018:2511
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2511
7
reference_url https://access.redhat.com/errata/RHSA-2018:2566
reference_id RHSA-2018:2566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:2566
8
reference_url https://access.redhat.com/errata/RHSA-2018:3816
reference_id RHSA-2018:3816
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3816
9
reference_url https://usn.ubuntu.com/3564-1/
reference_id USN-3564-1
reference_type
scores
url https://usn.ubuntu.com/3564-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.16
purl pkg:generic/postgresql@9.4.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.16
1
url pkg:generic/postgresql@9.5.11
purl pkg:generic/postgresql@9.5.11
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.11
2
url pkg:generic/postgresql@9.6.7
purl pkg:generic/postgresql@9.6.7
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.7
3
url pkg:generic/postgresql@10.2.0
purl pkg:generic/postgresql@10.2.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.2.0
aliases CVE-2018-1053
risk_score 3.0
exploitability 0.5
weighted_severity 6.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wcsh-zz5q-qqbf
25
url VCID-z4t8-c8vc-ayhd
vulnerability_id VCID-z4t8-c8vc-ayhd
summary Interactive installer downloads software over plain HTTP, then executes itmore details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7048.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7048.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7048
reference_id
reference_type
scores
0
value 0.12058
scoring_system epss
scoring_elements 0.93747
published_at 2026-04-01T12:55:00Z
1
value 0.12058
scoring_system epss
scoring_elements 0.93757
published_at 2026-04-02T12:55:00Z
2
value 0.12058
scoring_system epss
scoring_elements 0.93767
published_at 2026-04-04T12:55:00Z
3
value 0.12058
scoring_system epss
scoring_elements 0.9377
published_at 2026-04-07T12:55:00Z
4
value 0.12058
scoring_system epss
scoring_elements 0.93779
published_at 2026-04-08T12:55:00Z
5
value 0.12058
scoring_system epss
scoring_elements 0.93782
published_at 2026-04-09T12:55:00Z
6
value 0.12058
scoring_system epss
scoring_elements 0.93786
published_at 2026-04-11T12:55:00Z
7
value 0.12058
scoring_system epss
scoring_elements 0.93787
published_at 2026-04-13T12:55:00Z
8
value 0.12058
scoring_system epss
scoring_elements 0.93809
published_at 2026-04-16T12:55:00Z
9
value 0.12058
scoring_system epss
scoring_elements 0.93814
published_at 2026-04-18T12:55:00Z
10
value 0.12058
scoring_system epss
scoring_elements 0.93816
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7048
2
reference_url https://www.postgresql.org/about/news/postgresql-961-955-9410-9315-9219-and-9124-released-1712/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/postgresql-961-955-9410-9315-9219-and-9124-released-1712/
3
reference_url https://www.postgresql.org/support/security/CVE-2016-7048/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2016-7048/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378043
reference_id 1378043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378043
fixed_packages
0
url pkg:generic/postgresql@9.4.10
purl pkg:generic/postgresql@9.4.10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.10
1
url pkg:generic/postgresql@9.5.5
purl pkg:generic/postgresql@9.5.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.5
aliases CVE-2016-7048
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4t8-c8vc-ayhd
26
url VCID-zbj3-7xug-43f6
vulnerability_id VCID-zbj3-7xug-43f6
summary Constraint violation errors can cause display of values in columns which the user would not normally have rights to see.more details
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8161.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8161.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8161
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72358
published_at 2026-04-21T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72272
published_at 2026-04-01T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72279
published_at 2026-04-02T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72298
published_at 2026-04-04T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72274
published_at 2026-04-07T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72313
published_at 2026-04-08T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.72325
published_at 2026-04-09T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72348
published_at 2026-04-11T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72331
published_at 2026-04-12T12:55:00Z
9
value 0.00714
scoring_system epss
scoring_elements 0.72319
published_at 2026-04-13T12:55:00Z
10
value 0.00714
scoring_system epss
scoring_elements 0.72361
published_at 2026-04-16T12:55:00Z
11
value 0.00714
scoring_system epss
scoring_elements 0.7237
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8161
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244
6
reference_url https://www.postgresql.org/support/security/CVE-2014-8161/
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements ['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N']
url https://www.postgresql.org/support/security/CVE-2014-8161/
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1182043
reference_id 1182043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1182043
8
reference_url https://security.gentoo.org/glsa/201507-20
reference_id GLSA-201507-20
reference_type
scores
url https://security.gentoo.org/glsa/201507-20
9
reference_url https://access.redhat.com/errata/RHSA-2015:0699
reference_id RHSA-2015:0699
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0699
10
reference_url https://access.redhat.com/errata/RHSA-2015:0750
reference_id RHSA-2015:0750
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0750
11
reference_url https://access.redhat.com/errata/RHSA-2015:0856
reference_id RHSA-2015:0856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0856
12
reference_url https://usn.ubuntu.com/2499-1/
reference_id USN-2499-1
reference_type
scores
url https://usn.ubuntu.com/2499-1/
fixed_packages
0
url pkg:generic/postgresql@9.4.1
purl pkg:generic/postgresql@9.4.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.1
aliases CVE-2014-8161
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zbj3-7xug-43f6
27
url VCID-zrcc-w98g-gfhk
vulnerability_id VCID-zrcc-w98g-gfhk
summary pg_ctlcluster script in postgresql-common does not drop privileges when creating socket/statistics temporary directoriesmore details
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3466
reference_id
reference_type
scores
0
value 0.00128
scoring_system epss
scoring_elements 0.32181
published_at 2026-04-21T12:55:00Z
1
value 0.00128
scoring_system epss
scoring_elements 0.3219
published_at 2026-04-01T12:55:00Z
2
value 0.00128
scoring_system epss
scoring_elements 0.32198
published_at 2026-04-13T12:55:00Z
3
value 0.00128
scoring_system epss
scoring_elements 0.32231
published_at 2026-04-16T12:55:00Z
4
value 0.00128
scoring_system epss
scoring_elements 0.3221
published_at 2026-04-18T12:55:00Z
5
value 0.00128
scoring_system epss
scoring_elements 0.32326
published_at 2026-04-02T12:55:00Z
6
value 0.00128
scoring_system epss
scoring_elements 0.32364
published_at 2026-04-04T12:55:00Z
7
value 0.00128
scoring_system epss
scoring_elements 0.32188
published_at 2026-04-07T12:55:00Z
8
value 0.00128
scoring_system epss
scoring_elements 0.32237
published_at 2026-04-08T12:55:00Z
9
value 0.00128
scoring_system epss
scoring_elements 0.32265
published_at 2026-04-09T12:55:00Z
10
value 0.00128
scoring_system epss
scoring_elements 0.32266
published_at 2026-04-11T12:55:00Z
11
value 0.00128
scoring_system epss
scoring_elements 0.32228
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3466
1
reference_url https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/
reference_id
reference_type
scores
url https://blog.mirch.io/2019/11/15/cve-2019-3466-debian-ubuntu-pg_ctlcluster-privilege-escalation/
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3466
3
reference_url https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/
reference_id
reference_type
scores
url https://www.postgresql.org/about/news/additional-advisory-to-2019-11-14-cumulative-update-release-for-debian-and-ubuntu-users-1998/
4
reference_url https://www.postgresql.org/support/security/CVE-2019-3466/
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements ['AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H']
url https://www.postgresql.org/support/security/CVE-2019-3466/
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql-common:*:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3466
reference_id CVE-2019-3466
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3466
13
reference_url https://usn.ubuntu.com/4194-1/
reference_id USN-4194-1
reference_type
scores
url https://usn.ubuntu.com/4194-1/
14
reference_url https://usn.ubuntu.com/4194-2/
reference_id USN-4194-2
reference_type
scores
url https://usn.ubuntu.com/4194-2/
fixed_packages
0
url pkg:generic/postgresql@9.4.25
purl pkg:generic/postgresql@9.4.25
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.25
1
url pkg:generic/postgresql@9.5.20
purl pkg:generic/postgresql@9.5.20
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.5.20
2
url pkg:generic/postgresql@9.6.16
purl pkg:generic/postgresql@9.6.16
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.6.16
3
url pkg:generic/postgresql@10.11.0
purl pkg:generic/postgresql@10.11.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@10.11.0
4
url pkg:generic/postgresql@11.6.0
purl pkg:generic/postgresql@11.6.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@11.6.0
5
url pkg:generic/postgresql@12.1.0
purl pkg:generic/postgresql@12.1.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@12.1.0
aliases CVE-2019-3466
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zrcc-w98g-gfhk
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.4.0